assetnote / newtownerLinks
Abuse trust-boundaries to bypass firewalls and network controls
☆382Updated 3 months ago
Alternatives and similar repositories for newtowner
Users that are interested in newtowner are comparing it to the libraries listed below
Sorting:
- ☆172Updated 3 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆366Updated 11 months ago
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆81Updated 8 months ago
- ☆190Updated 6 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆241Updated 3 weeks ago
- jxscout superpowers JavaScript analysis for security researchers☆288Updated last month
- A collection of Turbo Intruder scripts.☆66Updated 9 months ago
- A streamlined tool for discovering private TLDs for security research.☆225Updated last week
- An experimental high-performance DNS query bruteforce tool built with AF_XDP for extremely fast and accurate bulk DNS lookups.☆233Updated 4 months ago
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- FrogPost: postMessage Security Testing Tool☆97Updated 2 weeks ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆145Updated 7 months ago
- unleashed ffuf☆226Updated 2 weeks ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆154Updated 2 months ago
- ☆106Updated last year
- ☆153Updated last year
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆87Updated 4 months ago
- Tool to parse subdomains from dmarc.live☆146Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆138Updated 11 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆277Updated 2 weeks ago
- ☆145Updated last year
- ai-based domain name generation☆96Updated 9 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 9 months ago
- Adobe Experience Manager (AEM) hacking toolkit☆89Updated last month
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆41Updated 4 months ago
- A Burp extension to help pentesters copy requests / responses for reports.☆50Updated 4 months ago
- AI/LLM local model integration for analysis of reconftw results☆84Updated 6 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- Gotta go fast☆150Updated 5 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆84Updated 9 months ago